Monday, 21 April 2014

Users to IT
Helpdesk /ITIL Service Desk technician ratio is very important whenever
you setup or reorganize the support unit. Following points need to be
considered before going live. You can re-evaluate these points quarterly to
identify bottle necks. Overloading a technician or not satisfying the minimum
ratio can result in chaos.

1-Complexity

a.# of devices

b.# of OS

c.# of different
software

d.# of complaints

e.Average problem
resolution time

2-Expertise

a.Technician
expertise

b.User expertise

3-Trends

a.new software
rollouts

b.patching and
updating

User: Technician

60 : 1

-15 for 1<OS version, 1<Hardware types

+10 for with
standard user privileges

+20 for with remote application deployment service

+15 for with
imaging and fast refresh technology

+15 for with
remote control

Always
remember that you are setting up an IT Service desk and not a fire fighting
team.

You can create a URL set, and then use it in access rules to allow
or deny access to websites specified in the set. When ISA Server processes a
rule that applies to a URL set, the URL set element of the rule is only
processed for Web traffic requests (HTTP, HTTPS, or FTP over HTTP). If a client
request uses another protocol (Firewall traffic), ISA Server ignores the URL
set when processing the rule. For example, if a rule has both a Computer set
and a URL set specified as destination criteria, only the Computer set will be
evaluated in the rule. The URL set will be ignored.

Note the following when creating URL sets:

You can specify one or more URLs
in URL format:

For HTTPS traffic, URL sets are
only processed if the URL does not have a path specified. For example,
http://a.com or "a.com". If the URL has a path specified (even
"/"), it is ignored for HTTPS traffic.

·<protocol>://<host>:<port>/<path>

How to block upload to Gmail / Yahoo / Hotmail?

To block upload traffic

Create a domain name set with *.gmail.com / gmail.com /
*.yahoo.com / etc

A combination of specialized organizational capacities for
delivering value to customers in the form of service is called IT Service Management
or ITSM. Capabilities are not acquired and should be residential and untangible
resources.

A Process is a set of coordinated activities combining and
implementing resources and capabiliites in order to produce an outcome and
provide value to customers or stakeholders.

Description of Process:

measureable + specific + outcomes + repond to events

Functions are organization units to perform different actions
and process.

Wednesday, 12 March 2014

As a
VNX Certified Implementation Engineer [EMCIE], you may have to perform OE
updates and enabler installation on regular basis. It is always recommended to update
storage sub system’s OS after initialization process.

Sunday, 2 February 2014

A few weeks back, I heard one of my colleague announced that
it is now a possibility that you can be tracked by your cellular phone even it is
turned off. To be honest I was pretty optimistic about that it is not possible.
But later when I heard the same from someone more reliable, I got curious to
find out more about this phenomenon.

Monday, 27 January 2014

So finally the bye bye time for the cult of an operating
system has arrived. Windows XP was undoubtedly the most successful operating
systems of information history for consumers and business alike.

Release days of windows XP goes into 2001.That was the time
when most of the users were happy with their Win98 and were reluctant to try
XP. This was pretty obvious and justified as XP predecessor (WinME) received
very bad word of mouth.

The beautiful GUI played a huge role in bringing up the positive
vibe and encouraged users to try the new OS. It required 64MB of RAM and I had
32MB in my Intel Pentium 2 computer. So I borrowed a 32MB one and completed the
installation. The look and feel of XP was mesmerizing. Despite the incapability of my hardware, I
kept on using the OS.

In last 12 years XP came a long way. It was patched up and
serviced several times to meet the new requirements. But for most of the users
out there have no good reason to leave XP. The reason behind this thought
process it that because each and every software available across the globe is still
compatible with Windows XP. And its successor was also had some issues and
mostly received bad word of mouth. I personally believed that Windows Vista became
a fully functional and stable operating system after the release of service pack
1. However the WOM was so strong and finally cleared by Windows7.

This was the time when we decided to POC Oracle 12c to
explore and understand its new features. Inside we all know that this is going
to be one hell of an awesome task. So we picked up our laptops and installed some
linuxs for this purpose. All was started well as we setup the OS in very few
times and begin to read the Oracle 12C guides.

It had been quite a time since I configured an 11g RAC. So I
was forgotten the all famous, lovely and beautiful pre requisites. But soon OS
installation done, the first thing I did is to jot down the pre requisite. I
have always preferred to write down the steps before executing them. Even
though these steps may be re stated, rearranged and or modified a million times
before the completion of the installation.

Once done with all the system parameters, kernel parameters and
configuring user and directory structure. Things were looking good, so I
proceeded further with source arrangements. Ah, that source was huge.
Downloading it and copying it to the system was quite a hell of a task itself. I
wonder what the hell is going on with the internet services; they all are just
no good.

Next, I configured X-manager on my laptop. I love this
application. Thanks to X-manger we can able to see the first screen; the OUI. There
were some days in my life when I only want to see this screen once. Oh I
shouldn't mention that is embarrassing.

Disclaimer: The Information, Logs, Tips & Tricks, Installation procedures and shortcuts mentioned in this site are for general information only. Please refer to original manufacturer's documentation for comprehensive information. Use theITlogs.com at your own risk.